|
Top 10 Email Phishing Attacks Deployed During the Holiday Season
Wednesday, December 9, 2020
Cyber Security experts warn business leaders to boost cyber security awareness among employees
CARY, N.C., Dec. 1, 2020 /PRNewswire/ -- As we head into the heart of the holiday season, cyber security experts are warning of growing threats to your online security. Technological advancements - while exciting and promising -- have opened doors of opportunity for cyber predators to find new ways to cheat people and organizations out of confidential and sensitive information. In particular, attackers benefit from phishing attacks during the holiday season, as technology use peaks with increased online transactions.
Experts at the tech training firm INE warn it is paramount for business leaders to develop a cyber awareness culture within their companies, and boost security awareness among employees. "Above all, organizations must build a resilient cybersecurity posture by increasing security awareness among employees and strengthening the first line of defense," says INE's CEO Richard McLain. During the holiday season, there is a hike in the number of spam emails sent, and security awareness about some of the most common types of phishing emails can play a significant role in protecting critical information.
Top 10 Holiday Phishing Attacks
1. Real Estate or Wire Transfer Scam: This phishing email resembles those
from real estate agents or regarding a property's closing date. Such
emails contain information to transfer funds.
2. Social Media Account Lockout: Alert emails may come from an unknown
source alerting malicious activities on Facebook or Instagram and direct
users to slick on a "More Information" link embedded within the email.
3. Order or Delivery Confirmation: Even though the user may not have ordered
anything, such emails contain fake order details and include a link to
check the order's status.
4. Job Search or Recruitments: Such emails will have attachments or links to
view job descriptions or resume formats and impersonate high authority
professionals to look authentic.
5. Financial Account Notifications: These emails pretend to be from banks or
investment establishments and request users to log in to view monthly
statements or perform some action using the link.
6. Refunds or Prize Notifications: Usually in the form of notification for
prize winners, some emails request user details for claiming their
rewards.
7. Donation Requests: Such phishing emails request funds to help the poor
during festivities or to victims of natural calamities and are linked
with the spammer's bank account as the beneficiary.
8. Legal Scares: These emails will force the users to pay immediately to
avoid legal actions. However, the activities mentioned in the email will
most likely be unknown to the users.
9. Top Authority or Executive Committee Staff: The email contains a spoofed
email address and impersonates authorized entities in an employee's
organization. It requests information regarding the organization.
10. Trusted Party Scams: The sender acts as the victim's acquaintance and
requests them to open a malicious attachment or clicking on an infected
URL in the email, which might be linked to a malicious website
The effects of phishing attacks can be devastating, and include loss of reputation, loss of intellectual property, regulatory fines and additional business costs. As the holiday season gets underway, attacks will be rampant. We would like to connect you with the Cyber Security experts at INE, to help your audience learn what to be aware of this season, and how to protect themselves. For more information and to see the entire blog post, visit www.ine.com.
View original content to download multimedia:http://www.prnewswire.com/news-releases/top-10-email-phishing-attacks-deployed-during-the-holiday-season-301182529.html
SOURCE INE, LLC
|
|
|
|
|
 |
Identiv Completes Thailand Manufacturing Transition, Unlocking Next-Generation Multicomponent Manufacturing for Advanced IoT Solutions | Jan 22, 2026
|
 |
Global Cyber Alliance Identifies Five Cybersecurity Forces That Defined 2025 - And Will Shape 2026 | Jan 22, 2026
|
 |
New Report Names States Most Vulnerable to Holiday Scams | Jan 22, 2026
|
 |
Android Mobile Adware Surges in Second Half of 2025 | Jan 22, 2026
|
 |
Healthcare Industry Executives are Likely to be Personal Targets of Cybercrime | Jan 22, 2026
|
 |
pgEdge Announces pgEdge Agentic AI Toolkit for Postgres | Jan 22, 2026
|
 |
Guardz 2025 SMB Cybersecurity Report: Nearly 50% of U.S. Small Businesses Have Been Hit by Cyber Attack | Jan 22, 2026
|
 |
Truvista Fiber Acquires SlyTel | Jan 22, 2026
|
 |
Breakthrough Progress: METiS TechBio Publishes Consecutive Research Findings in Nature Communications and the Journal for ImmunoTherapy of Cancer | Jan 22, 2026
|
 |
LG ELECTRONICS INTRODUCES 2026 LG GRAM LINEUP ELEVATED BY AEROMINUM | Jan 22, 2026
|
|
|
|